A software development manager wants to ensure the authenticity of the code created by the company. Which of the following options is the most appropriate?
Which of the following can be used to identify potential attacker activities without affecting production servers?
During an investigation, an incident response team attempts to understand the source of an incident. Which of the following incident response activities describes this process?
A security practitioner completes a vulnerability assessment on a company’s network and finds several vulnerabilities, which the operations team remediates. Which of the following should be done next?
An administrator was notified that a user logged in remotely after hours and copied large amounts of data to a personal device.Which of the following best describes the user’s activity?
During a security incident, the security operations team identified sustained network traffic from a malicious IP address: 10.1.4.9. A security analyst is creating an inbound firewall rule to block the IP address from accessing the organization’s network. Which of the following fulfills this request?